Thursday, October 30, 2025

How to uninstall if installer is not there and checking for malware


There's a better way to uninstall programs that do not have an installer, and I recommend using Nirsoft's UninstallViewUninstallView is a tool for Windows that collects information about all programs installed on your system and displays the details of the installed programs in one table, so you can interogate the columns. 

Sorting my Publisher column to reveal empty publisher is a good way to check for malware.


Available Columns to sort by

Field Description
Display NameThe official display name of the software (Stored in the Registry)
Registry NameThe name of the Registry key (under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall or HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall)
Display VersionThe official display version of the software (Stored in the Registry)
Registry TimeThe date/time that the Registry key of the software was modified
Install DateThe official install date of the software, stored in the Registry by the installer
Installed ForIndicates whether the software was installed for a specific user or all users
Install LocationThe path of the folder where the software is installed
Install Folder Created TimeThe creation date/time of the installation folder
Install Folder Modified TimeThe modified date/time of the installation folder
PublisherThe creator of the software
Uninstall StringFull command to uninstall the software
Quiet Uninstall StringFull command to quietly uninstall the software
Change Install StringFull command to change the installation of the software
CommentsComment about the software, stored in the uninstall Registry key
About URLURL to the publisher's or application's home page
Update Info URLURL used to update information on the application
Help LinkInternet address for technical support
Install SourceThe folder that contained the installer files
Installer NameName of the installer used (e.g., Windows Installer, Inno Setup)
Release TypeDisplays the release type of the software (e.g., Security Update)
Display Icon PathFull path of the icon file
MSI FilenameSpecifies the MSI filename (Windows Installer only)
Estimated SizeEstimated size of the software (from the Registry)
AttributesAttributes stored in the uninstall Registry key (e.g., System Component)
LanguageLanguage of the software (e.g., en-US)
Parent Key NameRegistry name of the parent uninstall item
Registry KeyFull path of the uninstall Registry key

Download UninstallView - View installed applications on Windows 11 / 10 / 8 / 7 / Vista and optionally uninstall them (nirsoft.net)

This will explore the below registry key for you.

For really technical removal you can explore the registry key path in the registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall

Tuesday, October 28, 2025

Cloud Storage Phishing email with subject Final Warning: Your Cloud Storage has reached its limit


For the record, this is general 
Cloud Storage  phishing email attempt that is recently going around, with subject "Final Warning: Your Cloud Storage has reached its limit" What to do?  Report them, goto bottom of page. 




From : CLoud_Notification<tyler.johnson232@prohibitionatl.com>
Subject : 
Final Warning: Your Cloud Storage has reached its limit

Outlook has identified this email as spam

PHISHING LINKs;

1. Hover over image
http://216.226.28.34.bc.googleusercontent.com/%dddddddddddd 

How to tell this is a Phishing email ?


  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to view source message; end examine the source location and emails links are from the domain claimed.

How to examine Email Message Source ?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email, take further 

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, October 27, 2025

MLab Internet Speed Test by Google - a more accurate internet speed test

Legacy Internet Speed Test Explained

Most internet speed tests base are based on traditional measurement of downloading a single stream 
(large file download). This is not a true representation of start/stop internet mixed traffic like your browser.

Most of us are most test internet speed while browsing sites.  A typical browser loads thousands of mini files (html, css, js, media files) when you visit a page. 

Now adays, even traditional single file videos streams are chunked into smaller pieces, so single file download test is outdated.  Below picture, are files loaded when watching a Youtube.com video. 




















Enter, a modern traffic internet speed therefore was needed, enter M-Lab Tests - M-Lab (measurementlab.net)


Legacy Internet Speed Test

Speed test by Ookla (used by all internet providers) measures only continuous single stream (large file download) but is not a true representation of start/stop internet mixed traffic like your browser.




I am contracted with Rogers for 1.5Mbps Down, 50Mbps up, and this lines up conveniently, but my internet is slow. 

MLab internet speed test is block internally by Rogers support, when I recently called technician about my slow internet! 
 

Modern Internet Speed Test


The Measurement Lab test sponsored by Google, uses mixed traffic. MSAK measures multi-stream traffic focused on throughput and latency, while NDT focuses on single-stream upload/download speeds and network diagnostics. MSAK is a more realistic internet traffic measurement.



Do  MLab Internet Speed Test



The MSAK test is more accurate load test that more accurately represents browsing websites. 

NDT MSAK  
Test ServerToronto, CAToronto, CA
Download409.85 Mb/s711.61 Mb/s
Upload17.36 Mb/s5.87 Mb/s
Latency38 ms20 ms
Retransmission0.23%0.00%


Modern Internet Speed Test Explained

MSAK (Measurement Swiss-Army Knife)

MSAK is a measurement service hosted by M-Lab that implements two different test protocols:

  • throughput: A configurable Websocket-based throughput measurement protocol capable of multi-stream tests. Its design is partially based on M-Lab’s single-stream measurement protocol, NDT. Configurable parameters currently include:
    • Number of streams
    • Congestion control algorithm
    • Test duration
    • Per-stream byte limit
  • latency: A UDP-based latency measurement protocol.

This is measurement is more reflective of website browsing traffic.

NDT (Network Diagnostic Tool)

NDT is a single stream performance measurement of a connection’s capacity for “bulk transport” (as defined in IETF’s RFC 3148). NDT reports upload and download speeds and latency metrics.

This is more like a traditional test; a more technical test used to for diagnosing issues with the network. 

Copilot Comparison

🔍 Key Differences

FeatureMSAKNDT
Measurement TypeThroughput (multi-stream) + LatencyThroughput (single-stream) + Diagnostics
Protocols UsedWebSocket (TCP), UDPTCP (BBR, Cubic, Reno)
ConfigurabilityHigh (streams, duration, CCA)Low (standardized test)
Diagnostic DepthBasic latency + throughputDetailed TCP-level diagnostics
Target AudienceResearchers, engineers'General users, policymakers


MSAK (Measurement Swiss-Army Knife)

Purpose: A flexible tool for measuring throughput and latency using configurable protocols.

  • Throughput Test:

    • Uses a WebSocket-based protocol.

    • Supports multi-stream testing.

    • Configurable parameters include:

      • Number of streams

      • Congestion control algorithm

      • Test duration

      • Per-stream byte limits

  • Latency Test:

    • Uses a UDP-based protocol to measure network latency.

  • Use Case: Ideal for researchers or engineers needing customizable network performance tests across multiple dimensions (e.g., congestion control behavior, stream concurrency).

NDT (Network Diagnostic Tool)

Purpose: Measures single-stream performance for bulk data transport, focusing on upload/download speeds and latency.

  • Metrics Reported:

    • Upload speed

    • Download speed

    • Latency (RTT)

    • Congestion indicators

    • TCP-level diagnostics (e.g., loss rate, retransmissions)

  • Protocols:

    • ndt7: Uses TCP BBR or Cubic, operates over HTTP(S) ports.

    • ndt5: Legacy support using Cubic.

    • web100: Deprecated, used Reno TCP.

  • Use Case: Best for users wanting a quick, standardized snapshot of their internet connection’s performance, especially for consumer advocacy or policy analysis.